In Apache CouchDB, a malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. This issue affected Apache CouchDB prior to 3.1.2
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2021-10-14T19:55:12

Updated: 2024-08-04T01:37:16.335Z

Reserved: 2021-08-09T00:00:00

Link: CVE-2021-38295

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-14T20:15:09.017

Modified: 2024-11-21T06:16:44.313

Link: CVE-2021-38295

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-10-12T00:00:00Z

Links: CVE-2021-38295 - Bugzilla